Investigating Transparent Web Proxies in Cellular Networks

Size: px
Start display at page:

Download "Investigating Transparent Web Proxies in Cellular Networks"

Transcription

1 Investigating Transparent Web Proxies in Cellular Networks Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David Choffnes, Ramesh Govindan USC & Northeastern University March 20, 2015

2 Introduction Mobile devices are primary web devices now, generating large amounts of Web traffic Traffic often passes through proxies deployed by cellular providers We don t know much about the proxy s features and their impact on performance 2

3 Overview Goal: Understand the behavior and impact of proxies on mobile users Results: All four major US cellular carriers use HTTP proxies Varying proxy features like object caching, image compression, or redirecting traffic based on a proxy s DNS resolution Proxies enhance performance in some (not all) scenarios 3

4 Background Client Server Mobile Carrier Network Public Internet 4

5 Background Client Client-facing connection Proxy Mobile Carrier Network Server-facing connection Server Public Internet Want to detect proxies and their features 5

6 Outline Overview Proxy detection and prevalence Proxy features Performance impact of split connections Conclusion 6

7 Proxy Interference! Compare client and server packet captures to detect proxy interference 7

8 Testbed Seattle Chicago? Boston?? Los Angeles? 8

9 Testbed Seattle Chicago! Boston!! Los Angeles! All carriers deploy proxies interfering with cellular traffic regardless of the client s location 9

10 Follow-up Questions 1 Is access to real websites and different content types also proxied? 2 How can we extend the methodology to a setting where we do not control the server? 10

11 Fingerprinting A No control SYN-ACK VS. B SYN-ACK 11

12 Fingerprinting No control SYN-ACK If client receives SYN-ACK without server receiving SYN, then the proxy split the connection Proxy fingerprint 12

13 Fingerprinting No control SYN-ACK Fingerprint on receiver window, window scaling factor, maximum segment size (MSS), and IP/ID pattern extracted from IP and TCP headers 13

14 Fingerprinting A No control SYN-ACK VS. B SYN-ACK 14

15 Proxy detection for Web traffic Collect traces using different access methods (cellular [c] vs. wired [w]) and protocols (HTTP [h] vs. HTTPS [s])? Mobile Access Wired Access 15

16 Proxy detection for Web traffic We know that: Traffic is proxied when accessing our own web server, i.e. the proxy generated Want to show that: Cellular HTTP traffic is proxied when accessing a non-controlled web server, i.e. proxy generated For this the following conditions need to hold: Server and proxy signatures do not match Signatures do not differ because of access type 16

17 Results for Web Traffic Proxying Alexa top 100 index pages All are proxied Additionally tested streaming URLs for Hulu, Netflix, and YouTube Proxied, except: T-Mobile bypasses proxy for Youtube video traffic 17

18 Outline Overview Proxy detection and prevalence Proxy features Performance impact of split connections Conclusion 18

19 Proxy Features Delayed Handshaking Redirection Transfer Caching Rewriting Content Teardown Connection Persistence Setup 19

20 Delayed Handshaking Server connection only established after proxy sees HTTP GET SYN HTTP GET SYN HTTP GET Observed with all four carriers Extra delay Extra delay depends on server-side latency 20

21 Redirection Google Public DNS? A A 21

22 Redirection Google Public DNS Destination IP: A Host: A B Ignores destination IP, does independent DNS resolution Observed with T-Mobile Complicates client-side diagnostics 22

23 Caching 1 Proxy serves cached copy 2 23

24 Caching Observed with T-Mobile and Sprint Most web objects are cached (excluding HTML) 24

25 Caching Caching is only beneficial for smaller files on connections with high server latencies 25

26 Rewriting Content A B Only observed for Sprint, which recompresses images 26

27 Rewriting Content Images up to 500 KB original size compressed Aggressive compression reduces fetch time and data usage 27

28 Proxy Features Delayed Handshaking Redirection Transfer Caching Rewriting Content Teardown Connection Persistence Setup 28

29 Outline Overview Proxy detection and prevalence Proxy features Performance impact of split connections Conclusion 29

30 Fetching a Single Object Cellular segment is the bottleneck with Sprint, resulting only in minimal latency reductions when connections are split 30

31 Measuring Impact on Web Browsing We replicate and host websites locally at our own server on both port 80 (proxied) and port 7777 (to bypass proxy) Tested three scenarios: A. News site (18 objects) B. Search (12 objects) C. Image site (8 objects with 2 large images) 31

32 Web Browsing: Results Proxy buffering compensates for loss episodes on server-facing connection Image compression massively reduces fetch times 32

33 Conclusion Cellular carriers use proxies with features like caching or image compression Through a fingerprinting technique, we found that traffic is proxied for almost all websites accessed via HTTP Split connections improve performance, especially when proxies buffer data or compress images, and when the serverfacing connection is the bottleneck 33

Investigating Transparent Web Proxies in Cellular Networks

Investigating Transparent Web Proxies in Cellular Networks Investigating Transparent Web Proxies in Cellular Networks Xing Xu 1, Yurong Jiang 1, Tobias Flach 1, Ethan Katz-Bassett 1, David Choffnes 2, and Ramesh Govindan 1 1 USC, {xingx,yurongji,flach,ethan.kb,ramesh}@usc.edu

More information

Diagnosing Path Inflation of Mobile Client Traffic

Diagnosing Path Inflation of Mobile Client Traffic Diagnosing Path Inflation of Mobile Client Traffic Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David Choffnes, Ramesh Govindan, Ethan Katz- Bassett, Z. Morley Mao, Matt Welsh University of Southern

More information

FlexiWeb: Network-Aware Compaction for Accelerating Mobile Web

FlexiWeb: Network-Aware Compaction for Accelerating Mobile Web FlexiWeb: Network-Aware Compaction for Accelerating Mobile Web What s the impact of web latency? 100ms 1% Delay sales Source : https://speakerdeck.com/deanohume/faster-mobilewebsites! 100ms 1% Delay revenue

More information

Quantifying Violations of Destination-based Forwarding on the Internet

Quantifying Violations of Destination-based Forwarding on the Internet Quantifying Violations of Destination-based Forwarding on the Internet Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan University of Southern California November 14, 2012 Destination-based Routing

More information

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management CSE/EE 461 Lecture 13 Connections and Fragmentation Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2 TCP Connection Management Setup assymetric 3-way handshake Transfer sliding window; data and

More information

A Library and Proxy for SPDY

A Library and Proxy for SPDY A Library and Proxy for SPDY Interdisciplinary Project Andrey Uzunov Chair for Network Architectures and Services Department of Informatics Technische Universität München April 3, 2013 Andrey Uzunov (TUM)

More information

Designing a Resource Pooling Transport Protocol

Designing a Resource Pooling Transport Protocol Designing a Resource Pooling Transport Protocol Michio Honda, Keio University Elena Balandina, Nokia Research Center Pasi Sarolahti, Nokia Research Center Lars Eggert, Nokia Research Center Global Internet

More information

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets. Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Intercepting Web Requests

Intercepting Web Requests This chapter contains the following sections: Overview of, on page 1 Tasks for, on page 1 Best Practices for, on page 2 Web Proxy Options for, on page 3 Client Options for Redirecting Web Requests, on

More information

Toward Next-Gen Low Latency Mobile Networks

Toward Next-Gen Low Latency Mobile Networks Toward Next-Gen Low Latency Mobile Networks Zengwen Yuan University of California, Los Angeles 2018-05-06 WiNG Wireless Networking Group More time spent on mobile Internet than ever 2 Every millisecond

More information

Avi Networks Technical Reference (16.3)

Avi Networks Technical Reference (16.3) Page 1 of 7 view online A TCP/UDP profile determines the type and settings of the network protocol that a subscribing virtual service will use. It sets a number of parameters, such as whether the virtual

More information

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V.

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V. Why HTTP needed extensions? A taste of HTTP v1.1 additions HTTP v1.1: introduces many complexities no longer an easy protocol to implement Simple (one packet) ) Web Page SYN Retrieval Time Propagation

More information

Lecture 15 Networking Fundamentals. Today s Plan

Lecture 15 Networking Fundamentals. Today s Plan Lecture 15 Networking Fundamentals Slides attributed to Neil Spring Today s Plan Talk about networking in general Layers, Routing Specifically about IP and TCP Service model, what TCP provides Work our

More information

Identifying Traffic Differentiation in Mobile Networks

Identifying Traffic Differentiation in Mobile Networks Identifying Traffic Differentiation in Mobile Networks Arash Molavi Kakhki, Abbas Razaghpanah, Anke Li, Hyungjoon Koo, Rajesh Golani, David Choffnes, Phillipa Gill, Alan Mislove Northeastern University,

More information

Improving HTTP Latency

Improving HTTP Latency Improving HTTP Latency Venkata N. Padmanabhan (U.C.Berkeley) Jeffrey C. Mogul (DEC Western Research Lab.) The Second International WWW Conference, Chicago October 17-20, 1994 [1] Outline Motivation Sources

More information

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer Why WAN accelerators (still) matter? Data Center Engineer Presentation Data Center Engineer @ Cerved Group SpA Red Hat RHCE VMware VCP-DCV NetApp NCIE-SAN Cisco CCIE Who is Andrea Dainese Cisco Architecture

More information

EE 122: HyperText Transfer Protocol (HTTP)

EE 122: HyperText Transfer Protocol (HTTP) Background EE 122: HyperText Transfer Protocol (HTTP) Ion Stoica Nov 25, 2002 World Wide Web (WWW): a set of cooperating clients and servers that communicate through HTTP HTTP history - First HTTP implementation

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:

More information

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver

More information

liberate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently

liberate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently liberate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill,

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION Department of Computer Science University of Calgary Professor: Carey Williamson March 2, 2012 This is a CLOSED BOOK exam. Textbooks, notes, laptops,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Lab Assignment 3 for ECE374

Lab Assignment 3 for ECE374 Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Factors Affecting Performance of Web Flows in Cellular Networks

Factors Affecting Performance of Web Flows in Cellular Networks in Cellular Networks Ermias A. Walelgne, Kim Setälä, Vaibhav Bajpai, Stefan Neumeier, Jukka Manner, Jörg Ott May 15, 2018 - FP Networking, Zurich ntroduction ntroduction ntroduction Motivation 99% of the

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

SamKnows test methodology

SamKnows test methodology SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections

More information

HTTP. Robert Grimm New York University

HTTP. Robert Grimm New York University HTTP Robert Grimm New York University Administrivia! Web cams! http://orwell1.cs.nyu.edu! http://orwell2.cs.nyu.edu! http://66.93.85.13/! Linux servers running JDK 1.4.1! class[20-25].scs.cs.nyu.edu! Reading

More information

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and

More information

9. Wireshark I: Protocol Stack and Ethernet

9. Wireshark I: Protocol Stack and Ethernet Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the

More information

A New Internet? RIPE76 - Marseille May Jordi Palet

A New Internet? RIPE76 - Marseille May Jordi Palet A New Internet? RIPE76 - Marseille May 2018 Jordi Palet (jordi.palet@theipv6company.com) -1 (a quick) Introduction to HTTP/2, QUIC and DOH and more RIPE76 - Marseille May 2018 Jordi Palet (jordi.palet@theipv6company.com)

More information

TBIT: TCP Behavior Inference Tool

TBIT: TCP Behavior Inference Tool TBIT: TCP Behavior Inference Tool Jitendra Padhye Sally Floyd AT&T Center for Internet Research at ICSI (ACIRI) http://www.aciri.org/tbit/ 1 of 24 Outline of talk Motivation Description of the tool Results

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Odin: Microsoft s Scalable Fault-

Odin: Microsoft s Scalable Fault- Odin: Microsoft s Scalable Fault- Tolerant CDN Measurement System Matt Calder Manuel Schröder, Ryan Gao, Ryan Stewart, Jitendra Padhye, Ratul Mahajan, Ganesh Ananthanarayanan, Ethan Katz-Bassett NSDI,

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

Advanced Network Design

Advanced Network Design Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course

More information

Lab Exercise Protocol Layers

Lab Exercise Protocol Layers Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 642-618 Title : Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) Vendors : Cisco

More information

QUIC. Internet-Scale Deployment on Linux. Ian Swett Google. TSVArea, IETF 102, Montreal

QUIC. Internet-Scale Deployment on Linux. Ian Swett Google. TSVArea, IETF 102, Montreal QUIC Internet-Scale Deployment on Linux TSVArea, IETF 102, Montreal Ian Swett Google 1 A QUIC History - SIGCOMM 2017 Protocol for HTTPS transport, deployed at Google starting 2014 Between Google services

More information

Factors Affecting Performance of Web Flows in Cellular Networks

Factors Affecting Performance of Web Flows in Cellular Networks in Cellular Networks Ermias A. Walelgne, Kim Setälä, Vaibhav Bajpai, Stefan Neumeier, Jukka Manner, Jörg Ott October 17, 2018 - RIPE 77, Amsterdam Introduction Introduction Introduction Motivation 99%

More information

MPTCP: Design and Deployment. Day 11

MPTCP: Design and Deployment. Day 11 MPTCP: Design and Deployment Day 11 Use of Multipath TCP in ios 7 Multipath TCP in ios 7 Primary TCP connection over WiFi Backup TCP connection over cellular data Enables fail-over Improves performance

More information

Tony Fortunato Sr Network Specialist The Technology Firm

Tony Fortunato Sr Network Specialist The Technology Firm T2-11 Trace File Analysis - Analyzing HTTP Traffic Behavior April 2, 2008 Tony Fortunato Sr Network Specialist The Technology Firm SHARKFEST '08 Foothill College March 31 - April 2, 2008 SHARKFEST '08

More information

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP Description Capturing a bulk TCP transfer from your computer to a remote server. In

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER Deploying the BIG-IP LTM system for BEA WebLogic Server F5 Networks and BEA systems have created a highly effective way to direct traffic

More information

A Robust Classifier for Passive TCP/IP Fingerprinting

A Robust Classifier for Passive TCP/IP Fingerprinting A Robust Classifier for Passive TCP/IP Fingerprinting Rob Beverly MIT CSAIL rbeverly@csail.mit.edu April 20, 2004 PAM 2004 Typeset by FoilTEX Outline A Robust Classifier for Passive TCP/IP Fingerprinting

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Networked systems and their users

Networked systems and their users Networked systems and their users q The expansion of the Google serving infrastructure q A personalized livestreaming system q A platform for crowdsourcing web QoE measurements Mapping the expansion of

More information

Effects of Internet Path Selection on Video-QoE

Effects of Internet Path Selection on Video-QoE Effects of Internet Path Selection on Video-QoE by Mukundan Venkataraman & Mainak Chatterjee Dept. of EECS University of Central Florida, Orlando, FL 32826 mukundan@eecs.ucf.edu mainak@eecs.ucf.edu Streaming

More information

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC) Troubleshooting Web Authentication on a Wireless LAN Controller (WLC) Document ID: 108501 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Web Authentication

More information

15-441: Computer Networks Homework 3

15-441: Computer Networks Homework 3 15-441: Computer Networks Homework 3 Assigned: Oct 29, 2013 Due: Nov 12, 2013 1:30 PM in class Name: Andrew ID: 1 TCP 1. Suppose an established TCP connection exists between sockets A and B. A third party,

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35 CONTENTS IN DETAIL ACKNOWLEDGMENTS xv INTRODUCTION xvii Why This Book?...xvii Concepts and Approach...xviii How to Use This Book... xix About the Sample Capture Files... xx The Rural Technology Fund...

More information

Summary Report. Prepared for: Refresh Date: 28 Oct :02

Summary Report. Prepared for: Refresh Date: 28 Oct :02 Prepared for: Selected Test: Test Type: Test Steps: 8 Dynatrace Mobile Demo Refresh Date: 28 Oct 2016 15:02 Time Period: Summary 259 Key Indicators Response Time (sec) Yesterday (27 Oct 2016 00:00 to 28

More information

Load Balancing Overview

Load Balancing Overview The "Load Balancing" feature is available only in the Barracuda Web Application Firewall 460 and above. A load balancer is a networking device that distributes traffic across multiple back-end servers

More information

Website Acceleration with mod_pagespeed

Website Acceleration with mod_pagespeed Website Acceleration with mod_pagespeed Joshua Marantz Google June 15, 2011 @jmarantz www.modpagespeed.com 2011 Google, Inc. All rights reserved. Velocity 2011: Faster By Default 2 Velocity 2011: Faster

More information

Configuring Stickiness

Configuring Stickiness CHAPTER 6 Date: 5/7/09 This section provides information about sticky behavior and procedures for configuring stickiness with the ANM. Sections include: Stickiness Overview, page 6-1 Configuring Sticky

More information

Computer Networks - Midterm

Computer Networks - Midterm Computer Networks - Midterm October 28, 2016 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if

More information

Optimizing Energy of HTTP Requests in Android Applications

Optimizing Energy of HTTP Requests in Android Applications Optimizing Energy of HTTP Requests in Android Applications Ding Li and William G. J. Halfond University of Southern California Los Angeles, California, USA {dingli,halfond}@usc.edu ABSTRACT Energy is important

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Design and implementation of an MPLS based load balancing architecture for Web switching

Design and implementation of an MPLS based load balancing architecture for Web switching School of Electronic Engineering - DCU Switching and Systems Laboratory Design and implementation of an MPLS based load balancing architecture for Web switching Radu Dragos, Sanda Dragos and Martin Collier

More information

CSE 473 Introduction to Computer Networks. Midterm Exam Review

CSE 473 Introduction to Computer Networks. Midterm Exam Review CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)

More information

Writing Assignment #1. A Technical Description for Two Different Audiences. Yuji Shimojo WRTG 393. Instructor: Claudia M. Caruana

Writing Assignment #1. A Technical Description for Two Different Audiences. Yuji Shimojo WRTG 393. Instructor: Claudia M. Caruana Writing Assignment #1 A Technical Description for Two Different Audiences Yuji Shimojo WRTG 393 Instructor: Claudia M. Caruana November 9, 2016 1 Introduction I work in IT technical support at a web design

More information

Content Deployment and Caching Techniques in Africa

Content Deployment and Caching Techniques in Africa Content Deployment and Caching Techniques in Africa Presentation to the AfPIF Peering Coordinators Day Dar Es Salaam 2011 Mike Blanche 1 Agenda Current Content Hosting Situation Content Hosting Content

More information

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria: (a) Reserving network resources ahead of data being sent: (2pts) In circuit-switching networks,

More information

n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning

n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning Outline n Understand EC-Council s scanning methodology n Describe scan types and the objectives of scanning n Understand the use of various scanning and enumeration tools Chapter #3: n Describe TCP communication

More information

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2 Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer Video Streaming, CDN and Sockets Sec 2.6 2.7 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

PARCEL: Proxy Assisted BRowsing in Cellular networks for Energy and Latency reduction

PARCEL: Proxy Assisted BRowsing in Cellular networks for Energy and Latency reduction PARCEL: Proxy Assisted BRowsing in Cellular networks for Energy and Latency reduction Ashiwan Sivakumar 1, Shankaranarayanan PN 1, Vijay Gopalakrishnan 2, Seungjoon Lee 3*, Sanjay Rao 1 and Subhabrata

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

AD FS v3. Deployment Guide

AD FS v3. Deployment Guide Deployment Guide UPDATED: 15 November 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Configuring F5 for SSL Intercept

Configuring F5 for SSL Intercept Configuring F5 for Welcome to the F5 deployment guide for configuring the BIG-IP system for SSL intercept (formerly called with Air Gap Egress Inspection). This document contains guidance on configuring

More information

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable

More information

CSE 461 MIDTERM REVIEW

CSE 461 MIDTERM REVIEW CSE 461 MIDTERM REVIEW NETWORK LAYERS & ENCAPSULATION Application Application Transport Transport Network Network Data Link/ Physical Data Link/ Physical APPLICATION LAYER Application Application Used

More information

Presented by: Fabián E. Bustamante

Presented by: Fabián E. Bustamante Presented by: Fabián E. Bustamante A. Nikravesh, H. Yao, S. Xu, D. Choffnes*, Z. Morley Mao Mobisys 2015 *Based on the authors slides Mobile apps are increasingly popular Mobile platforms is the dominant

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen. 20 June 2017 EPFL Summer Research Institute

Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen. 20 June 2017 EPFL Summer Research Institute Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen Cecylia Bocovich Ian Goldberg 20 June 2017 EPFL Summer Research Institute Censorship Censors may monitor, alter or block traffic

More information

Paper survey related with web/app performance optimization and MEC. Youngseok Lee

Paper survey related with web/app performance optimization and MEC. Youngseok Lee Paper survey related with web/app performance optimization and MEC Youngseok Lee lee@cnu.ac.kr cnu.lee@ucdavis.edu 1 1. Mobile Edge Computing: A Survey, in IEEE Internet of Things Journal, vol. 5, no.

More information

Linux Networking: tcp. TCP context and interfaces

Linux Networking: tcp. TCP context and interfaces Linux Networking: tcp David Morgan TCP context and interfaces Computer A Computer B application process application process data data data data TCP process TCP process a network 1 TCP purposes and features

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks

More information

LIFEGUARD: Practical Repair of Persistent Route Failures

LIFEGUARD: Practical Repair of Persistent Route Failures LIFEGUARD: Practical Repair of Persistent Route Failures Ethan Katz-Bassett (USC) Colin Scott, David Choffnes, Italo Cunha, Valas Valancius, Nick Feamster, Harsha Madhyastha, Tom Anderson, Arvind Krishnamurthy

More information

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -

WarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects - WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying

More information

TLDK Overview. Transport Layer Development Kit Keith Wiles April Contributions from Ray Kinsella & Konstantin Ananyev

TLDK Overview. Transport Layer Development Kit Keith Wiles April Contributions from Ray Kinsella & Konstantin Ananyev TLDK Overview Transport Layer Development Kit Keith Wiles April 2017 Contributions from Ray Kinsella & Konstantin Ananyev Notices and Disclaimers Intel technologies features and benefits depend on system

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

CSCI-1680 WWW Rodrigo Fonseca

CSCI-1680 WWW Rodrigo Fonseca CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Scott Shenker and John Jannotti Precursors 1945, Vannevar Bush, Memex: a device in which an individual stores all his books, records, and

More information

Configuring IP TCP MSS

Configuring IP TCP MSS Finding Feature Information, page 1 Feature History for IP TCP MSS, page 2 Information About IP TCP MSS, page 2 Licensing Requirements for IP TCP MSS, page 3 Default Settings for IP TCP MSS, page 3 Guidelines

More information

Traditional Web Based Systems

Traditional Web Based Systems Chapter 12 Distributed Web Based Systems 1 Traditional Web Based Systems The Web is a huge distributed system consisting of millions of clients and servers for accessing linked documents Servers maintain

More information

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages (h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages Mauro Sardara, Luca Muscariello, Alberto Compagno Software Engineer ICNRG Interim Meeting, London, 18 th of March

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

Oboe: Auto-tuning Video ABR Algorithms to Network Conditions

Oboe: Auto-tuning Video ABR Algorithms to Network Conditions Oboe: Auto-tuning Video ABR Algorithms to Network Conditions Zahaib Akhtar, Yun Seong Nam, Ramesh Govindan, Sanjay Rao, Jessica Chen, Ethan Katz-Bassett, Bruno Ribeiro, Jibin Zhan, Hui Zhang : Co-primary

More information